Skip to content

Abishek Shah

IT Security Specialist / Cyber Security Engineer | Network Security Expert | Software Developer

Innovating IT security and emerging technologies for a safer digital world. Specializing in advanced cybersecurity solutions, AI-driven threat intelligence, secure infrastructure design, and comprehensive security frameworks with over 9 years of expertise.

9+Years Experience
100+Projects
15+Certifications

About Me

IT Security Specialist & Cybersecurity Engineer with a passion for securing digital assets

Melbourne, VIC, Australia

IT Security Specialist with over 10 years of experience in securing digital assets

I'm Abishek Shah, an experienced IT professional with over 10 years of expertise in managing information systems and technology. Skilled in threat analysis, security operations, risk management, and data protection. A continuous learner with a strong background in software development, incident response, vulnerability assessment, and penetration testing.

I excel in designing and implementing security solutions, specializing in network and application security, cryptography, security compliance, and cloud security. I have a proven record of accomplishment of creating secure networks and systems to protect sensitive data, and I'm eager to contribute my skills as a Cybersecurity Specialist to enhance defenses against evolving threats and ensure data confidentiality and integrity.

10+ Years Experience
15+ Certifications
Master's Degree
Continuous Learner
10+

Years Experience

Years of hands-on experience in IT security and cybersecurity engineering

50+

Projects

Successful projects delivered across various industries and technologies

15+

Certifications

Professional certifications in cybersecurity and IT management

24/7

Support

Dedicated support and commitment to client security needs

Skills & Expertise

My technical skills and areas of expertise in IT security and cybersecurity

Technical Security Skills

Penetration Testing95%
Vulnerability Management90%
Network Security92%
Cloud Security88%
Security Architecture85%
Incident Response90%
Risk Management85%
Cryptography80%

Software Development

Python85%
Java80%
PHP75%
C#78%
React82%
Node.js80%
SQL/NoSQL85%
Docker75%

Soft Skills

Problem-Solving95%
Communication90%
Leadership85%
Time Management88%
Collaboration92%
Adaptability90%

Security Frameworks & Compliance

ASD Essential Eight95%
ISO/IEC 2700190%
NIST CSF88%
CIS Controls (v8)85%
GDPR & APPs80%
PCI DSS82%

Additional Technical Expertise

Security

  • Firewalls & IDS/IPS
  • SIEM Implementation
  • Endpoint Security
  • DevSecOps
  • Security Automation

Infrastructure

  • Network Infrastructure
  • IPsec & VPN
  • DNS Management
  • Cloud Architecture
  • Disaster Recovery

Management

  • IT Project Management
  • Change Management
  • Strategic Planning
  • Budgeting
  • Team Leadership

Work Experience

My professional journey in IT security and cybersecurity

ICT Officer

Mar 2024 - Present
National Children's and Youth Law CenterUNSW, Australia

Providing comprehensive IT support and managing cybersecurity initiatives for the organization.

Key Achievements:

  • Provided comprehensive IT support to staff, volunteers and Executives managing support tickets and collaborating with IT service providers for efficient issue resolution
  • Administered Microsoft 365 services (Azure AD, Exchange, Intune, Power Flows) and manage the inventory of software and hardware assets
  • Contribute to the development and execution of security awareness training and helped in updating and implementing IT and cybersecurity policies
  • Collaborated with stakeholders, MSP's and security vendors to ensure secure IT systems and projects, strengthening the organization's cybersecurity maturity
  • Supported the installation, maintenance, and compliance of security applications, while overseeing the security and preventive maintenance of ICT systems (backups, recovery, integrity controls)
  • Monitored system performance, propose enhancements, and provide insights to shape ICT strategies, policies, and long-term plans for organizational growth

Cyber Security Analyst

Mar 2022 - Mar 2024
Vibrant Education & Migration ServicesSydney, Australia

Conducting vulnerability assessments and implementing security frameworks to protect organizational data.

Key Achievements:

  • Conducted thorough vulnerability assessments to identify and address system weaknesses, enhancing the overall security of company data
  • Implemented and supported governance, risk, and compliance frameworks, ensuring strict adherence to security standards and regulatory requirements for robust cybersecurity
  • Applied expertise in secure software development, enforcing coding principles aligned with the CISSP Domain 8 framework to enhance overall system security
  • Monitored and analysed security logs and events, swiftly identifying, and responding to potential security threats, contributing to a fortified cybersecurity posture for the organization
  • Provided continuous scrutiny of security logs, promptly responding to potential threats, thus bolstering the organization's resilience against cybersecurity challenges

Software Developer

Jun 2021 - Mar 2024
Independent Sole TraderSydney, Australia

Developing robust, scalable software solutions for SMEs as an independent contractor.

Key Achievements:

  • Conducted thorough analysis and documentation of software requirements, aligning them with client business needs and implementing Software Development Life Cycle (SDLC), version control, and continuous integration/deployment through platforms such as Git, Docker, AWS, Azure, and Google Cloud
  • Engineered robust, scalable, and user-friendly software solutions for SMEs, demonstrating proficiency in programming languages including Python, Java, PHP, C#, and ASP.NET, along with expertise in HTML/CSS
  • Orchestrated front-end design with a focus on responsive design and cross-browser compatibility, utilizing technologies such as React, Angular, and Vue.js. Executed back-end development using Node.js, Django, ASP.NET, RESTful APIs, and microservices architecture for both desktop and mobile applications
  • Crafted optimized relational databases to ensure best and responsive performance, leveraging expertise in SQL, MySQL, PostgreSQL, and NoSQL. Implemented UI/UX design principles, usability testing, wireframing, and prototyping
  • Implemented a comprehensive software development approach, incorporating a variety of programming languages and technologies, to deliver tailored solutions that meet client requirements and industry standards

IT Analyst

Jun 2021 - Mar 2022
Vibrant Education and Migration ServicesSydney, Australia

Analyzed business requirements and managed IT infrastructure to support organizational goals.

Key Achievements:

  • Conducted in-depth analysis of business requirements to identify opportunities for enhancing IT solutions and aligning them with organizational goals
  • Oversaw the administration of Windows, file, and database servers, optimizing workflows through cloud platform utilisation for network, storage, and subsystems
  • Managed the installation and configuration of servers, hardware, and peripherals, strictly adhering to standards and operational requirements for seamless integration
  • Developed and supported the IT infrastructure, including Windows, VMWare, backup and recovery, security, and network components, ensuring alignment with organizational needs
  • Implemented and supported the operational efficiency of Windows, VMWare, backup and recovery, security, and network components, contributing to a robust IT infrastructure aligned with organizational requirements

Information Technology Security Engineer

Jun 2019 - Jan 2020
UnisysSydney, Australia

Designed and implemented comprehensive security frameworks to enhance cybersecurity posture.

Key Achievements:

  • Designed and implemented a comprehensive security framework to enhance the organization's cybersecurity posture and mitigate potential threats, resulting in improved overall data protection
  • Led a team in conducting a thorough security audit, finding, and addressing critical vulnerabilities in the network infrastructure, achieving a reduction in security risks, and ensuring compliance with industry standards
  • Spearheaded the development of a robust incident response plan, significantly reducing the mean time to detect and respond to security incidents, enhancing the organization's resilience against cyber threats
  • Implemented a proactive vulnerability management program, resulting in a decrease in the number of security vulnerabilities across the organization's systems and applications, strengthening the overall security posture
  • Orchestrated and executed a company-wide security awareness training program, reducing the number of security breaches related to human error and fostering a security-conscious organizational culture

Featured Projects

A selection of my recent work in cybersecurity, software development, and research

SkyOS – Unified AI Operating System

SkyOS – Unified AI Operating System

Artificial Intelligence

Sky Nexus Australia • 2024

AI
Machine Learning
System Architecture
Python
Cloud Computing

A unified AI operating system designed to integrate various AI capabilities into a cohesive platform for enhanced productivity and automation.

LegalTech - Transformation

LegalTech - Transformation

Legal Technology

Sky Nexus Australia • 2023

Legal Tech
Process Automation
Document Management
AI
Cloud Solutions

A comprehensive legal technology transformation project aimed at modernizing legal processes through technology integration.

Justice App – AI Law Analysis

Justice App – AI Law Analysis

Legal AI

Sky Nexus Australia • 2022

AI
Natural Language Processing
Legal Analysis
Mobile App Development
Cloud APIs

An AI-powered application for legal analysis, providing insights and assistance for legal professionals.

Structural Damage Detection using UAV and Neural Network

Structural Damage Detection using UAV and Neural Network

AI & Machine Learning

Victoria University • 2022

Neural Networks
UAV Technology
Image Analysis
Python
Data Preprocessing

Application of UAV technology and neural networks for detecting structural damage in buildings and infrastructure.

Security Frameworks & Compliance

Expertise in implementing and maintaining compliance with industry-standard security frameworks

ASD Essential Eight

Australian government's cybersecurity framework with eight essential mitigation strategies.

ISO/IEC 27001

International standard for information security management systems (ISMS).

NIST CSF

National Institute of Standards and Technology Cybersecurity Framework.

APPs

Australian Privacy Principles for handling personal information.

GDPR

General Data Protection Regulation for data protection and privacy in the EU.

PCI DSS

Payment Card Industry Data Security Standard for handling credit card information.

HIPAA

Health Insurance Portability and Accountability Act for medical information privacy.

CIS Controls (v8)

Center for Internet Security Controls for effective cyber defense.

SOC 2

Service Organization Control 2 for managing customer data.

Achievements & Certifications

Professional achievements, certifications, and recognized expertise

ACS Certified ANZSCO Roles

ICT Project Manager

2023

ANZSCO 135112

Australian Computer Society

ICT Managers (nec)

2023

ANZSCO 135199

Australian Computer Society

ICT Security Specialist

2021

ANZSCO 262112

Australian Computer Society

Key Impact Highlights

Reduced System Downtime

Reduced system downtime by 40% through proactive infrastructure monitoring, automated failover strategies, and streamlined disaster recovery planning.

Accelerated Incident Response

Accelerated incident response by 30% by integrating SIEM tools, refining escalation protocols, and enhancing log analysis capabilities.

Achieved Compliance

Achieved 95%+ compliance with ISO/IEC 27001 and ASD Essential Eight by enforcing policies, conducting regular internal audits, and rolling out security awareness programs.

Minimized Security Vulnerabilities

Minimized security vulnerabilities by 60% via continuous penetration testing, secure code practices, and a structured patch management process.

Lowered IT Operational Costs

Lowered IT operational costs by 25% through cloud migration, resource optimization, and the introduction of automation in key IT processes.

Community Involvement

My contributions to the community and volunteer experiences

Leadership Award | LEAD

Victoria University2022-2023

Recognized for exceptional leadership skills and contributions to the university community.

Support Worker | Community Engagement

Equality Disability and Healthcare2023

Provided support services and engaged with the community to promote equality and healthcare access.

Volunteer | Study NSW

Sydney Airport2018

Assisted international students arriving at Sydney Airport as part of the Study NSW program.

Volunteer | Nepal Earthquake Relief Program

St. Xavier CollegeKathmandu, Nepal2015

Participated in relief efforts following the devastating earthquake in Nepal.

Volunteer | Balkhu Slum Settlement

St. Xavier CollegeKathmandu, Nepal2015

Provided support and assistance to residents of the Balkhu Slum Settlement.

My Services

Comprehensive security solutions to protect your digital assets

Cybersecurity Consulting

Comprehensive security assessments, vulnerability management, and implementation of robust security controls to protect your digital assets.

Penetration Testing

Thorough security testing to identify vulnerabilities in your systems and applications before malicious actors can discover and exploit them.

Network Security

Design and implementation of secure network architectures, including firewalls, VPNs, and intrusion detection systems.

Cloud Security

Secure cloud infrastructure design, implementation, and management with focus on data protection and compliance.

Database Security

Protection of sensitive data through robust database security controls, encryption, and access management solutions.

Custom Software Development

Tailored software solutions designed with security in mind, addressing specific business challenges and enhancing operational efficiency.

Security Policy Development

Creation of comprehensive security policies, procedures, and guidelines aligned with industry standards and regulatory requirements.

Security Awareness Training

Customized training programs to educate your team on security best practices, threat recognition, and incident response.

Brand Design

Strategic brand identity development including logo design, color palettes, typography, and comprehensive brand guidelines to establish a strong market presence.

Digital Marketing

Comprehensive digital marketing strategies including social media, content marketing, email campaigns, and paid advertising to boost your online presence and drive growth.

SEO Optimization

Data-driven search engine optimization services to improve your website's visibility, increase organic traffic, and enhance your online presence through proven techniques.

Certifications & Courses

Professional certifications and continuous learning achievements

Network Security Associate

Fortinet2023

Certification in network security fundamentals and Fortinet security solutions.

Fortinet Certified in Cybersecurity

Fortinet2023

Comprehensive certification in cybersecurity principles and Fortinet security technologies.

Certified Information Systems Security Professional (CISSP)

ISC²2021

Globally recognized certification for information security professionals.

Certified Ethical Hacker (CEH)

EC-Council2019

Certification for professionals skilled in identifying weaknesses in computer systems.

Offensive Security Certified Professional (OSCP)

Offensive Security2020

Hands-on penetration testing certification demonstrating practical skills.

Professional Development

Continuous learning and professional growth initiatives

ECA Professional Year Program

2022 - 2023
Professional Australia

A professional development program designed for international graduates in IT to enhance their skills and employability in the Australian job market.

Key Achievements:

  • Completed 44 weeks of professional development training
  • Developed advanced workplace communication and teamwork skills
  • Gained practical experience through a 12-week internship
  • Enhanced understanding of Australian workplace culture and practices

Advanced Cybersecurity Workshop Series

2021
CyberSec Institute

Intensive workshop series covering advanced topics in cybersecurity and emerging threats.

Key Achievements:

  • Mastered advanced threat hunting techniques
  • Developed skills in security automation and orchestration
  • Completed hands-on labs in cloud security architecture
  • Participated in collaborative red team exercises

Client Testimonials

What clients say about working with me

"Abishek's expertise in cybersecurity transformed our organization's security posture. His methodical approach to identifying vulnerabilities and implementing solutions was impressive."
Sarah Johnson
Sarah Johnson
CTO, TechInnovate Solutions

Get In Touch

Have a question or want to work together? Reach out to me.

Contact Information

Location

Sydney, Australia

Availability

I'm currently available for freelance work, consulting, and full-time positions. Feel free to reach out to discuss how we can work together.

Send Me a Message

Ready to Secure Your Digital Assets?

Let's work together to protect your organization from cyber threats and build a robust security posture.